Pro+ Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
June 2008

Virtualization server security best practices

Virtualization changes the game for enterprise IT, but security doesn't have to be a barrier to implementation. Five years from now, few enterprises will use "real" computers. Everything done with databases, Web applications or file shares will be intercepted and emulated by virtualization software, allowing one rack-mount server to act like 10. Virtualization is inescapable; it's the most important new force in enterprise IT since IP networks. A security professional could be forgiven for feeling a lingering sense of dread about the implications of this trend. On internal networks, virtualization is redrawing the map, taking servers and applications that were once separated by hardware and network filtering and cramming them onto the same blade server. No change that far-reaching could come without security challenges, and the products we're using to make those changes aren't even 10 years old. The good news is that virtualization is a win for enterprise security. Patching, staging, deployment and change management--chronic ...

Access this Pro+ Content for Free!

By submitting you agree to recieve email from TechTarget and its partners. If you reside outside of the United States you consent to having your personal data transferred and processed in the United States. Privacy Policy

Features in this issue

  • GRC Tools Help Manage Regulations

    GOVERNANCE, RISK AND COMPLIANCE We look at three GRC products and the distinct ways these tools can help organizations navigate the complicated regulatory game.

Columns in this issue